
Answer-first summary for fast verification
Answer: 1. Visit Cloud Logging to view Data Access audit logs. 2. Search for the user‘s email as the principal.
The correct answer is C because the Data Access audit logs provide a detailed record of data access activities, allowing you to see if the user attempted to access any sensitive data. Searching for the user's email as the principal in these logs can help identify such activities. Options A and D are incorrect because System Event logs do not contain data access-related information. Option B is incorrect because Admin Activity logs do not provide data access-related information either. For more details, refer to [Google Cloud Logging documentation on audit logs](https://cloud.google.com/logging/docs/audit) and [configuring data access](https://cloud.google.com/logging/docs/audit/configure-data-access).
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
After a key employee left your organization abruptly, their Google Account remained active for 3 weeks. How can you determine if they accessed any sensitive data during this period?
A
B
C
D
No comments yet.